Preferred Language
Articles
/
bsj-2862
Detection of BRCA1and BRCA2 mutation for Breast Cancer in Sample of Iraqi Women above 40 Years
...Show More Authors

Breast cancer is the commonest cancer affecting women worldwide. Different studies have dealt with the etiological factors of that cancer aiming to find a way for early diagnosis and satisfactory therapy. The present study clarified the relationship between genetic polymorphisms of BRCA1 & BRCA2 genes and some etiological risk factors among breast cancer patients in Iraq. This investigation was carried out on 25 patients (all were females) who were diagnosed as breast cancer patients attended AL-Kadhemya Teaching Hospital in Baghdad and 10 apparently healthy women were used as a control, all women (patients and control) aged above 40 years. The Wizard Promega kit was used for DNA isolation from breast patients and normal individuals. By this method suitable quantities of DNA approximately (50 µl) with purity ranged from (1.7-1.9) were obtained from 100-200µg of fresh biopsy which had been taken from women breast patients. The extracted DNA was successfully used in amplification of BRCA1 & BRCA2 genes by PCR and some mutation were detected. The outcome of genetic analysis indicated that the percentage of 185delAG mutation was 16 (4 patients) whereas, the percentage of 5382insC mutation was 32 (8patients) in BRCA1 gene and the third mutation 6174delT in BRCA2 present in 3 patients only (12%). The study demonstrated that the frequency of BRCA1 mutation (48%) was higher than BRCA2 (12%) in this sample of Iraqi women with breast cancer.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of Iraqi Virtual Library
...Show More Authors

      In developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Study of alumina prepared from Iraqi kaolin
...Show More Authors

The current research was conducted to report the synthesis of alumina powder from Iraqi kaolin. The kaolin was transformed to metakaolin by calcinations at temperature 800 °C for three hours. Then the calcined kaolin was treated with (1.5 M) from H2SO4 for 6 hours to form Al2(SO4)3.12H2O solution. The precipitate was dried at 80oC for 10 hours and calcinations at different temperatures for two hours. The samples which result was characterized by X–Ray diffraction (XRD) and X–Ray fluorescence (XRF). The results indicate to the crystalline hydrate aluminum sulfate for the sample that be as – synthesis and when calcinations at 600 oC transformed into aluminum sulfate phase. The phases of alumina which we obtain consisted of a gamma a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of the Role of Interleukein-2 and Interleukein-4 in the Immunopathogenesis of Steroid Therapy Resistance in Iraqi Asthmatic Patients
...Show More Authors

Interleukins (IL-2 and IL-4) are increased in asthmatics and were reported to induce resistance to steroid therapy in some patients who fail to get benefit from glucocorticoids when used in full dose and for long period of time. In this context, the present study was conducted on Iraqi patients to provide additional laboratory mean, beside the clinical diagnosis, for the decision whether the asthma is steroid sensitive or resistant by monitoring the level of immunoglobulins, complement proteins and interleukins among asthmatic patients (steroid sensitive or resistant) and the possible contribution of other factors like age, sex and environments in the development of steroid resistance. A total number of 55 asthmatics and 28 normal subjec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref